Key Hygiene

Created: 28.07.2022

This is about … .

  • Don’t embed keys into the source code.
    • Search the code for password and secret.
  • Use different keys for different applications.
  • Rotate them ðŸ’Ŧ
  • Remove unused ones
  • MFA for the most sensitive operations (write, execute). Read operations are optional.

References

Expand… Something here